Using context-profiling to aid access control decisions in mobile devices.
Aditi GuptaMarkus MiettinenN. AsokanPublished in: PerCom Workshops (2011)
Keyphrases
- access control
- mobile devices
- context aware
- fine grained
- data security
- dynamic access control
- security policies
- access control policies
- access control models
- security mechanisms
- role based access control
- security model
- mobile phone
- security architecture
- identity management
- access control systems
- database
- security requirements
- role assignment
- database security
- data protection
- access control mechanism
- domain specific